IX Web Hosting Hosting Manual

June 26th, 2007

Table of Contents
1. Accessing the Control Panel ......................................................................... 6 1.1 How to access ....................................................................................... 6 1.2 Billing system ....................................................................................... 6 2. Control Panel Basics ...................................................................................... 7 2.1 Your temporary index page ...................................................................... 7 2.2 Uploading your site ................................................................................... 7 2.3 Contents of your web space..................................................................... 7 3. Domains ......................................................................................................... 10 3.1 Adding domains ...................................................................................... 10
3.1.1 Registering new domains ............................................................................ 10 3.1.2 Adding domains to your control panel ...................................................... 10 3.1.3 How to turn on/off web and mail services ................................................. 10 3.1.4 Configuring domains ................................................................................... 11

3.2 Removing domains ................................................................................. 11 3.3 Creating sub domains ............................................................................. 11 3.4 Domain aliasing ....................................................................................... 12
3.4.1 Creating a domain alias ............................................................................... 12

3.5 Shared vs. Dedicated IP addresses ....................................................... 13 4. DNS ................................................................................................................ 14 4.1 What is DNS? ........................................................................................... 14 4.2 How to change domain name servers? ................................................. 14
4.2.1 Registered with IX Web Hosting ................................................................. 14 4.2.2 Other registrar .............................................................................................. 15 4.2.2.1 To locate your domain name servers: ................................................. 15 4.2.2.2 To change the domain name servers: ................................................. 15

4.3 How do I create custom DNS records? ................................................. 15
4.3.1 Removing the default DNS records ............................................................ 16 4.3.2 Adding custom A records ........................................................................... 16 4.3.2 Adding custom MX records......................................................................... 17 4.3.3 Adding custom CNAME records ................................................................. 17

5. Creating, promoting and managing your site............................................. 19 5.1 SiteStudio site builder ............................................................................ 19 5.2 Search engine submit ............................................................................. 19 5.3 WebShell file manager ............................................................................ 20
5.3.1 What is WebShell? ....................................................................................... 20 5.3.2 How to use .................................................................................................... 20 5.3.3 How to backup your site .............................................................................. 20

5.4 Webalizer, Modlogan and Awstats ......................................................... 20
5.4.1 Webalizer and Modlogan ............................................................................. 20 5.4.2 Awstats and others ...................................................................................... 22

5.5 Reverse trace route ................................................................................. 22 6. FTP ................................................................................................................. 23 6.1 What is FTP?............................................................................................ 23 6.2 Changing your FTP password................................................................ 23 6.3 Connecting to a FTP client ..................................................................... 23 6.4 How to navigate files ............................................................................... 24 6.5 How to transfer files ................................................................................ 24 2

6.6 FTP sub-accounts (Linux) ...................................................................... 24
6.6.1 What is it? ..................................................................................................... 24 6.6.2 Setting up an FTP sub-account .................................................................. 24

6.7 Virtual FTP ............................................................................................... 25
6.7.1 Enabling Virtual FTP .................................................................................... 25 6.7.2 Add a FTP user ............................................................................................. 26

6.8 Anonymous FTP ...................................................................................... 27
6.8.1 Configure anonymous FTP: ........................................................................ 27

6.9 Anonymous FTP Upload Facilities ........................................................ 27 7. Adding features to your website ................................................................. 29 7.1 Site settings ............................................................................................. 29
7.1.1 Redirect URL ................................................................................................ 29 7.1.2 Directory index ............................................................................................. 29 7.1.3 Directory indexes ......................................................................................... 30 7.1.4 Error pages ................................................................................................... 31 7.1.5 Htprotect / Htaccess..................................................................................... 31 7.1.6 Server side imagemap ................................................................................. 33 7.1.7 Paths ............................................................................................................. 34 7.1.8 Ports .............................................................................................................. 34 7.1.9 MIME types ................................................................................................... 35 7.1.10 Error logs .................................................................................................... 35

7.2 Adding support for dynamic web content............................................. 35
7.2.1 CGI scripts .................................................................................................... 35 7.2.2 PHP scripts ................................................................................................... 36 7.2.3 ASP ................................................................................................................ 36 7.2.4 ASP.NET ........................................................................................................ 36 7.2.5 ColdFusion ................................................................................................... 36 7.2.6 Server Side Includes .................................................................................... 37

7.3 One click install scripts (Linux) ............................................................. 37
7.3.1 Counter ......................................................................................................... 37 7.3.2 Guestbook .................................................................................................... 37 7.3.3 Formmail ....................................................................................................... 38 7.3.4 Chat ............................................................................................................... 38 7.3.5 PhpBB (Linux and Windows) ...................................................................... 38 7.3.6 mnoGoSearch ............................................................................................... 39 7.3.7 Fixing problem scripts ................................................................................. 39 7.3.8 Adding custom CGI scripts (Linux and Windows) .................................... 40

7.4 FrontPage extensions ............................................................................. 40
7.4.1 Installation .................................................................................................... 40 7.4.2 Configuration ................................................................................................ 40 7.4.3 Fixing problems............................................................................................ 40 7.4.4 How to resolve common errors .................................................................. 40 7.4.4.1 No extensions found on server or unable to connect to server ....... 40 7.4.4.2 We80.cnf................................................................................................. 41 7.4.4.3 Forms ..................................................................................................... 41

8. Managing traffic ........................................................................................... 42 8.1 How do I change the traffic limit? .......................................................... 42 8.2 Throttle policies....................................................................................... 42 9. E-mail ............................................................................................................. 44 9.1 Mailboxes ................................................................................................. 44
9.1.1 Creating a Mailbox ....................................................................................... 44 9.1.2 Configuring a mailbox ................................................................................. 44

3

...................................... 59 9.............................. 58 9..............3........................... 45 9........................................ 48 9....6...........................2 POP before SMTP ...2 Editing an auto responder message ......................................1 Port 25 Block ......3.............................................................. 62 10....................4........................3 Removing an auto responders........... 58 9.7. 62 10..4 Mailing lists . 61 10.....................................2................................................................ 59 9....................................8 Troubleshooting ......................1 What is it? .........................................................................................................8 Requesting white listing ......... 57 9..................7............................................................................ 47 9.......................... 58 9...................................................................................................5 Adding moderators to your mail list...................................................8..............................4.1 How to get unblocked ...................................1 Adding a mailing list ...............2 Other webmail clients ..........8.................. 55 9......................7..............3.1....................................3 Changing mailbox password ............... 57 9.....................9............................................. 57 9.................1............6...........4........... 45 9......... 48 9...................................................................7.........................9...1 Configuring Thunderbird .....2 Login from the login page ...... 49 9....................9................. 50 9.............4 Adding/Removing MySQL users....8................................................................. 58 9........................5..............3 Login directly to webmail ............1..1 Change password from the control panel .............1 What is Spam? ...........................................6.................7 Webmail.............................. 56 9.......................................4....................................7 Securing your list .3 Forwards ...4.....2 How we fight it ...1.............4.4...3..........................................................1......................... 55 9.............................................................1 Hosting MySQL databases ................................... 57 9....9 SPAM ................................1 Creating a Forward...................................... 54 9......................................2 Configuring email clients.......................... 54 9.... 47 9............................1......................... 62 10......................5 Changing user passwords .........................................3.......... 56 9.1................... 56 9...... 61 10........2......... 61 10..........................1 Login from the control panel.............................. 62 4 .....................................................8.....2 Configuring a Forward .................................................................5 Mailbox alias .............................. 46 9.......................... 56 9........1 How to use ........................................................3 How to reduce .....................................3 Adding subscribers to your mail list ............................2 Configuring a mailing list ........................................................1.......................................................................1......................... 56 9.................................... 54 9....2 phpMyAdmin.......3......................................3 Configuring Outlook 2003 ...............................6 Removing moderators from your mail list .....................2 Creating MySQL databases ......... 45 9.................................................7......... 61 10. 49 9.........3 Postmaster block .........................4................................................................................................9............... 57 9....................... 50 9................................................1 Adding an auto responder........................................4...................6 Changing user permissions ... 46 9.........................3 Changing MySQL disk quota .........................2 Thunderbird Spam Assassin Filters .........................................................................................................................................................................................1................ 58 9...................2...............................................8.....................................................1................ 48 9.................................................................6 Mail auto responders ............................1 SpamAssassin filters in Outlook Express ..................................................1.......9........... 49 9............................................. Databases .... 45 9............1 Adding/Removing a mailbox alias ... 58 9................................................. 47 9....................................1 MySQL ....................3...................3 Forwarding to multiple addresses ..... 46 9........2 Configuring Outlook Express ....................... 56 9.......................... 61 10......................9........... 59 10..2 Change password from the login page ................................................................................

......................1.... 65 10.................... 63 10............................................. 64 10.....1...................5.............................................4............................................................1.................................................. 77 12........................... 76 12................................................... 68 11................2 Creating a temporary certificate .............................2 Removing users ..............................................1 Adding PostgreSQL users .........................................2..........................................3 Restoring backups ...........................4 PgSQL ......2........................................................................................................... 62 10............... 65 10..6..... 65 10.......3 Editing DSN records ............................1 What is SSL? .......................................1 Preinstalled osCommerce ........1 Ticket center .....................1....2...........................................3...................................................................................................................................................................................... Creating an online store ..........................3...... 64 10..... 72 12.................................3...........2...................................2 osCommerce controls ................................. 65 10............................... 77 13........ 64 10..................................1 Setting up other shopping carts .................................................................................................3.......................5................2 Shared vs................. 65 10..2 Creating a new DSN record ........................3 PostgreSQL.....3 Changing PgSQL disk quota ...................................................................... 65 10................ Getting technical support.2 Shopping cart options ...................1 Editing MySQL databases ............................................................................2 Creating backups ..........1 Editing PgSQL databases.................................................................... 76 12...........................3.......2................................... 68 11....................2.............................................................................................. 63 10..............6.....2 Live chat .........................3......................................1 Hosting Microsoft SQL databases ............................................ 63 10.....................................................................6........................... 66 10................................4. 78 13. 77 12.............................. 63 10..........3 More information ...5 MSSQL (Windows plans only) ...................................... 65 10......................4...................................... 65 10................3 Phone support ...................3 Adding MSSQL database users ........ 69 11.......................3.... 64 10..........2 Creating MSSQL databases ................ 76 12. 78 5 ............... 78 13............4 Changing MSSQL disk quota ................................................. 78 13...........6...........................2 Creating PostgreSQL database .............................. 64 10.................................................................1 Using our shared SSL certificate ..............5..1 Providers ...............1 Setting up osCommerce ........4 Deleting DSN records ............ 77 12................................................................................ SSL ...............................2 Installing an SSL certificate................................... 64 10....5...............................................................................5 Changing passwords ...................1 What is ODBC? ...................................................................10...............2........................ 67 11..................... 68 11......1 Hosting PostgreSQL databases..... 68 11.......2.............6 ODBC .... 76 12..............................4 Adding/Removing PostgreSQL users ............................................................................................. Dedicated SSL ................................................. 64 10.............................................................3 Acquiring a permanent certificate .......... 68 11.................................. 63 10...............2 How to setup ............................................................ 69 11.....................1.........

1 How to access This manual will focus on management of your hosting account and features. Accessing the Control Panel 1.pdf 6 .ixwebhosting. the control panel can be accessed from the manage button by your hosting account.com/ Once you login.com/templates/ix/docs/IX_Billing_Manual.1.2 Billing system All other features of the Billing and Administration System are further explained in our billing manual which is available at the following URL: http://www.ixwebhosting. You can log in to the control panel at the following URL: http://manage. 1.

yet some of them are common for all plans. Whenever possible.2 Uploading your site The contents of your website will be placed into a folder that is named the same as your site's domain name. 2. It is also highly recommended to make backups of your website and content often. such as Filezilla. The files and folders that compose your site must be transferred to the server. a directory for your site is created on the server. upload your site using these included features. or an application that does not include a publish feature you will need to use a freestanding FTP client. This directory contains a temporary index page which is accessible from the internet. For instance.3 Contents of your web space Your root directory contains several default directories. Their names will differ depending on your plan. if you used SiteStudio to upload a site with 15 pages and later you published an updated 7 page version of this site.” NOTE: Site publishing tools do not remove your old web content from the server. Many of the popular site design programs have built in publishing features that will simplify the upload process. if you made your site with SiteStudio. be careful not to overwrite it with a publish command.2. SmartFTP. 2.1 Your temporary index page As soon as a domain is added to your account. use their integrated web publishing tools to upload your site. which can cause problems. the site may become cluttered with old files. If you publish many versions of a website. the directory will have all the new pages and the old pages that have not been overwritten. This page is just a default place holder that will be removed or replaced by your website once published or uploaded. 7 . WARNING: If you have a complete website. For instance. Control Panel Basics 2. FrontPage or Dream weaver. or the built in file manager “WebShell. If you made your site with a text editor.

html files or any other files that you want to make accessible from the Internet. Each such directory contains its own set of log files that are required to write and read the data about all visits to your sites.conf directory will result in incorrect SSL operation. you will have several such directories. You can modify which files and folders can be used. The images directory 8 . The cgi-bin directory This is the default location that you place any CGI or Perl applications. Deleting these directories will disable your statistic programs and remove any accumulated site statistics.Here are some of the directories that are automatically created: The logs directory It contains directories for each site with transfer logs enabled. However. Deleting the ssl. They are named the same as your site's domain name. The virtual FTP directory This directory is created when you enable Virtual FTP Server and can be accessed by virtual FTP users to list and download its content. The ssl. you may harmlessly delete individual files in these directories. The Webalizer or Modlogan directories Each of these directories is created by default or when the stat programs Webalizer and Modlogan are enabled from your control panel. Deleting the Logs directory will cause the loss of the web statistics accumulated over the course of your site’s operation. These files are not essential and can be deleted. Deleting Virtual FTP directories will cause incorrect operation of Virtual FTP. Use extreme caution. The domain directory Each of your domains and subdomains are located in their own directories. The cp directory This folder contains many of the help and example files used as you navigate our control panel.conf directory This directory stores SSL pairs for all encrypted sites. If you have more than one site. These are the directories where you will upload your . WARNING: Deleting any domain directory will delete your site and all content.

Deleting any of the files/folders in your web space can affect the performance of your website.The images folder is the location where the default index page images are placed. 9 .

this will result in up to 72 hours of downtime during propagation. 3.3.1 Registering new domains From the account control panel you can register a new domain anytime. this will result in up to 72 hours of downtime during propagation. To turn on/off web or mail services: . - Click the “Add new domain” link to add a new domain to the list.Select the domain from the list and click on the domain name.You can click the on/off button beside web or mail service to enable/disable it. NOTE: When you first add your domain it will retrieve a new IP address and reset all web content.1 Adding domains 3. Click the “Add a Domain Name” link to start the ordering process.1. .1. 3. From the control panel click the domain icon. - Clicking the edit buttons for either service will let you configure the options for that specific service and domain.From the control panel click the domain icon.2 Adding domains to your control panel Once you register your domain you must add it to your hosting control panel. 10 .3 How to turn on/off web and mail services You can turn web and mail services on or off from your account control panel. Turning off web service will remove your web content and release the assigned IP address. WARNING: Please ensure you have a backup of all your web content before continuing. . When turned on your site will retrieve a new IP address and reset all web content. Domains 3.1.

You can click the edit button for either service to configure the options for that specific domain.. subdomain. or mail services: . WARNING: Please ensure you have a backup of all your web content before continuing.1.e. web. To remove a domain: .From the control panel click the domain icon. share a DNS zone. etc. 3.Select the domain from the list and click on the domain name.Click the “trash can” icon to the right of the domain name to remove that specific domain.2 Removing domains You may for many reasons want to remove a domain from your account. 3. add icon beside sub 11 . Removing a domain will remove all associated web content and release the assigned IP address. .From the control panel click the domain icon.Select the domain from the domain list if you have more than one. including web site management.example. It is added on the left of the domain name. . FTP.3. You can create as many subdomains as allowed by your plan. .4 Configuring domains To configure DNS. go through the following steps: .3 Creating sub domains A subdomain is a lower level domain. To create a subdomain. mail services. . i. Click the domains. Domains and subdomains have equal functional capabilities.From the control panel click the domain icon. dedicated IPs.com.

every Internet user who goes to example.net will land in example.separate mail service 3. This means. A domain alias can have: . . Click the Add icon in the Domain Aliases field at the bottom of the page. example.4 Domain aliasing Domain aliasing. .com 3. exactly as you register domain names.net and have it point to the location of example.com.ixtestdomain. This must be a fully qualified domain name.com: - - Leave the create DNS zone box unchecked if the domain alias is registered on a different DNS server.its own DNS zone . for instance example. e.com. if your domain name is example.4. For example. or domain stacking.com.Register the alias.From the control panel click the domain icon. you can register another domain name. 12 . The domain alias will not be maintained and mail service will be inaccessible for this domain alias.custom DNS records .- Enter a new subdomain name and click “create subdomain” This will result in the creation of the subdomain test. Enter the domain alias.1 Creating a domain alias .g. is creating additional domain names that would point to the IP of a different domain.Select the domain from the domain list if you have more than one.

Click the “change to dedicated IP” link in the IP address field. do the following: . I agree with the above".Select the domain from the domain list if you have more than one.5 Shared vs. Selecting “new mail domain alias” will set the new domain as a mail domain alias to the existing domain. NOTE: After you switch from a dedicated to shared IP address. You’ll be able to create and edit custom DNS records for the domain alias and mail service. You can only switch from a shared to dedicated IP address if you have not exceeded your dedicated IP limit. To change the type of IP.From the control panel click the domain icon. To access a domain you can use either the IP address or domain name. Shared IP address: One IP address is assigned to several domains. .- - Check the create DNS zone if you want a DNS record for this domain alias to be created on this hosting server. You can set the alias domain up with its own mail service or it can be an alias to an existing email account. 3.If prompted. Dedicated IP addresses This is also called virtual hosting (shared IP) and dedicated IP hosting. There are a few limitations to this that revolve around the fact that you can only access the domain by its domain name. 13 . . NOTE: Switching from a shared to dedicated IP address will delete your virtual FTP and SSL services. confirm the change by clicking "yes. not the IP address. . Dedicated IP address: One IP address is assigned to one domain. it will take up to 72 hours for propagation before the domain becomes available at the new IP address.

DNS can be considered something similar to a phone book. 4.” The box will expand and you will have the option to change the default name servers.1 What is DNS? Domain Name System – This is an Internet system that relates domain names into IP addresses.4.2 How to change domain name servers? 4.232. As the Internet understands it. When you register a domain by means of the control panel. but in some cases you may need to setup custom records to your DNS zone. and asks "how do I contact example. your ISP looks at the DNS server. there will be domain management options on the main page of the account control panel.105.4". all DNS records are automatically created for you.1 Registered with IX Web Hosting If your domain is registered with us. but your phone number may change.com web site. You can also change your domain name servers.com?" The DNS server responds: "It can be found at 198. In order to point your name to the new phone number. the IP address can be compared to a phone number: When someone calls http://www. In this way. which houses the http://www. When you move from one location to another.Click the + sign beside “Modify DNS Servers. From this location you can manage all aspects of your domains registration.example. . 14 . DNS 4. this can be considered the phone number for the server. you must contact the telephone service provider so they assign you the new phone number and update all directory information to reflect you as pointing to this new phone number.example. The DNS records for your domain are kept on a name server in a place called a DNS zone. such user intervention requires knowledge of DNS configuration and clear understanding of what is to be done.com/. To change the domain name servers: . An example would be when you want all email to be processed by an external mail server rather than by the built-in mail system. However.2.Click the domain registration manage button from the account control panel main page as displayed in the picture above. your name stays the same.

2.1 To locate your domain name servers: . 4.Log in to your domain registrars website . .The primary and secondary name servers are listed on this page similar to what you see below. This can be useful in many instances. 4.2.Look for the domain or hosting settings area.2.Select the domain from the domain list if you have more than one. 4. such as when setting up an outside mail server or to map a domain to a different server.2 To change the domain name servers: . please refer to the Domain section of the Billing Manual. You will place the information you found when you located your domain name servers into these blanks.3 How do I create custom DNS records? Custom DNS records are required to manage any outside server through our name servers. .There may be an option such as “change DNS” or “update name servers” . . . Your name servers with us are sent in the initial hosting account email and can also be found in the hosting account control panel.2. 4. 15 .It can take up from 24 to 72 hours for propagation before the site is accessible.From the control panel click the domain icon.2.You should see 2 or more boxes to place name server information.2 Other registrar You can usually change your domain name servers at the registrars’ website or by contacting the registrar.For more information regarding the management of your domain registration through IX Web Hosting.

.2 Adding custom A records An A record gives you the IP address of a domain.3. .3. It can also be used to map a domain to a different server or a sub domain to the correct IP address. This will remove all hosting content and release your ip address.4.From the control panel click the domain icon.Select the domain from the domain list if you have more than one. This will be accessible at the prefix.Click the edit button to the right of DNS configuration. For this reason the only way to remove the default dns records is to turn web or mail service off.example. 16 . To add a new DNS A record. do the following: . This allows users that visit www.com to go to the right IP address. .domain.Click the add DNS A record link.com. Name: Enter the prefix to map.1 Removing the default DNS records Removing the default DNS A or MX records will make your site inaccessible. 4.

3 Adding custom MX records Custom MX records should be added when you want to use your external mail servers to process your e-mail.4 Adding custom CNAME records CNAME records are used to map aliases with domain names. 4. . if you set the priority of the custom MX record higher than 10. To use your external servers instead of those you get by default.Click the add DNS MX record link.TTL: Set how many seconds will elapse before the record is refreshed in the DNS cache (a time to live period of 86400 is recommended). Then the default mail server will take over. IMPORTANT: To add an MX record for the base domain. If you set the priority of the custom MX record lower than 10. The priority of the custom MX record will define whether your external servers will act as primary or secondary. For instance. Name: Your local domain name. . your mail will be sent to your external mail server until it goes down or becomes otherwise inaccessible.3. your external mail server will be used as secondary. 4. 17 . do the following: . To add a new DNS MX record.Click the edit button to the right of DNS configuration. Data: Enter the IP of the web server. If you leave the name field blank. To use the external mail servers in addition to those you get by default. you need to disable mail service on the Domain Settings page. your external mail server will be used as primary. leave the name field empty.From the control panel click the domain icon. all mail will be redirected for the base zone. Data: The priority the record and mail domain name (not the IP) mail will be forwarded to. you need to keep mail service enabled in the control panel.Select the domain from the domain list if you have more than one.3. . In the first case.

From the control panel click the domain icon. Name: The alias you give to the real host name. Data: The real name of the host you create an alias to. A CNAME-record should always point to an A-record to avoid circular references.Select the domain from the domain list if you have more than one. TTL: Set how many seconds will elapse before the record is refreshed in the DNS cache. .Click the add DNS CNAME record link. It can’t be an alias. do the following: . . 18 .Click the edit button to the right of DNS configuration. . This must be an official host name.To add a new DNS CNAME record.

WARNING: Avoid submitting to a large number of web sites at a time or the browser will time out before the program has finished. Click the launch icon for the desired domain. . It can take more than a month for your site to be indexed. active 19 . Description: This text will show to Internet users as a description of your site in the list of search results. promoting and managing your site 5. We can not guarantee that they will honor this request. It is generally considered more effective to go to the individual search engine sites and request directly to the search engines.2 Search engine submit So your site is up and running? Help others find it among the millions of websites on the Internet! Our search engine submission tool is a quick and easy way to make the search engines aware of your site. . and submission alone is normally not enough in the current competitive market to attain top level placement in major search engines. NOTE: This tool will send a request for the search engines to index your website in their search engine pool.Click the SiteStudio icon in the control panel. Tactics such as the use of keywords. the site will get registered with only a few search engines. Then follow the on-screen instructions. To start the Search Engine Submit utility: . 5.5. check the engines to register the site with and fill in the requested fields. To start SiteStudio: . Key Words: Some search engines provide the possibility for entering additional keywords your site can be searched by. if it will be at all.1 SiteStudio site builder Before you pay a fortune to a web design studio or waste hours making a nice looking web site in FrontPage. Click the submit button. There are many governing factors that determine search engine placement. Time-out: This is the time you allow for registering one site with all search engines. Contact Email: Most search engines require a contact e-mail address. If this period is too short. Be patient while the server processes your request. consider our online site builder that will create you a professional website in a matter of minutes and automatically post it to your directory on the server.On the page that appears. and is only as reliable as the search engine you are submitting to. Creating.Select the domain to submit.From the control panel click the submit URL icon. This is a supplemental tool.

(Linux only) Once they are enabled it will take between 24-48 hours for your web statistics to start working.Check the box next to the files and folders to be archived and downloaded. Modlogan and Awstats 5. . you can setup password protection on the directory through Htprotect or Htaccess.If the stat program is already turned on.2 How to use The WebShell application is very useful for navigating. . Once open you will see a list of files. accessing and modifying your site files and folders.1 What is WebShell? WebShell allows you to copy.3.com/webalizer or http://domain. To launch WebShell: .4 Webalizer. and rename files and directories in your home directory on the server. If you wish to make you statistics private. 5. 5.You can then click the file icon beside the created archive file to download it.Click the create button to proceed.Click the off icon for the stat program and domain you wish to have stats for. . click the magnifying glass to be redirected to your web statistics page. compress and decompress files as well as preview them in the browser.From the control panel click the WebShell3 icon.3 WebShell file manager 5. You can select multiple files or folders to perform various tasks to.1 Webalizer and Modlogan Webalizer and Modlogan are popular web statistic programs that track the actions of users to your site. .3. 5. move.promotion and links to your site from other sites should always be employed for optimal results.Click the archive button in the top level menu.3 How to backup your site To backup your site files: . It is similar in function to any FTP application. is considered a 'hit'.4. 5. . Webalizer stat labels Hits Any request made to the server which is logged.Click the stats icon from the control panel. do the following: . delete. NOTE: The Webalizer and Modlogan directories are located at http://domain. To access Webalizer or Modlogan. An archive form shows to the right with a name of the zipped file.3.com/modlogan which is web accessible. download. You can also use it to upload. The folder named the same as your domain name is the public files that compose your site. 20 .

When this happens. This does not include the other stuff that goes into a document..phtml'. This number represents the number of 'pages' requested only. such as an html page or graphic image. Sites Each request made to the server comes from a unique 'site'. The 'sites' number shows how many unique IP addresses made requests to the server during the reporting time period. this should be a fairly accurate representation of the amount of outgoing traffic the server had. Visits Whenever a request is made to the server from a given IP address (site). I'm not sure if I totally agree with that viewpoint. In general. it should be considered a pretty close "guess". '. it is considered a 'new visit'. graphic images. '. audio files. for any request whose URL is one of the 'page' types defined with the PageType option.The requests can be for anything. The relationship between 'hits' and 'files' can be thought of as “incoming requests” and “outgoing responses”.pl' as pages as well. any HTML document. The default timeout value is 30 minutes (can be changed). so it is up to the web server to produce accurate numbers in the logs (some web servers do stupid things when it comes to reporting the number of bytes).php3' and '. Note: Visits only occur on PageType requests. the amount of time since a previous request by the address is calculated (if any). etc.. regardless of the web servers reporting quirks. Files Some requests made to the server. KBytes The KBytes (kilobytes) value shows the amount of data that was sent out by the server during the specified reporting period. and then returns at 3:00. or anything that generates an HTML document. Pages Pages are. This number represents the total number of requests that were made to the server during the specified report period. the visits total should be discounted on 'Grouped' records. This DOES NOT mean the number of unique individual users (real people) that visited. log rotations and other factors. this number might be about as close as you will get). rather.. Each valid line in the server log is counted as a hit. would be considered a page. it is considered a 'file' and the files total is incremented. The default action is to treat anything with the extension '. such as '. 21 . an IP address. and thought of as the "Minimum number of visits" that came from that grouping instead. that is. What actually constitutes a 'page' can vary from server to server. well. Some people consider this number as the number of 'pure' hits. which is impossible to determine using just logs and the HTTP protocol (however. CGI scripts. and does not include the other 'stuff' that is in the page. two visits would be registered. html pages. such as graphic images. this number should not be taken as absolutely accurate. Due to the limitation of the HTTP protocol. which can be referenced by a name or ultimately.htm'. so if a user visits your site at 1:00 in the afternoon. etc. Some other programs (and people :) refer to this as 'Pageviews'. require that the server then send something back to the requesting client. audio clips.html' or '. If the time difference is greater than a pre configured 'visit timeout' value (or has never made a request before). This value is generated directly from the log file.cgi' as a page. A lot of sites will probably define other extensions. pages! Generally. and this total is incremented (both for the site and the IP address).. NOTE: In the 'Top Sites' table.

There are many other programs out there that will report much deeper in certain areas. 22 . .In the form that appears. and exit. your site. not 1000 :) Top Entry and Exit Pages The Top Entry and Exit tables give a rough estimate of what URL's are used to enter your site. Because of limitations in the HTTP protocol. you can use this tool to determine if a host is reachable and how long it takes for the signal to go all the way through.NOTE: A kilobyte is 1024 bytes. To launch the reverse trace route tool. . log rotations. 5. however will give a good indication of the overall trend in where users come into. enter the host name or the IP address of the server you would like to ping.5 Reverse trace route This network troubleshooting tool allows you to ping any Internet host from your hosting server. If you see the connection is slow. click the reverse trace route icon. do the following: . In other words. and what the last pages viewed are. etc. .The next page will show all the hosts that were passed to reach the target server.4.Select the timeout period. Many use Awstats with great success to provide the advanced statistics they require.On your control panel page. this number should be considered a good "rough guess" of the actual numbers.2 Awstats and others Many customers are not satisfied with the limited reporting capability of Webalizer and Modlogan and look for something more.Click trace and wait for the result. select a bigger period. . 5. Most of these programs can be installed in your web space and configured to work with our service.

This guide will focus on using Filezilla to transfer files. Username: A username is a required unless you are using anonymous FTP.1 What is FTP? FTP or file transfer protocol is a common way to transfer files to and from servers. if you have the basics. Username: A username is a required unless you are using anonymous FTP. 6. To connect to your FTP server: .Go to your control panel. This information applies to most of the popular FTP software. If the connection was successful you will have a list of the files and folders located in your website root directory. 6. Click the icon beside password to change the current password. SmartFTP. It is also a common way to share accessed to files with others.2 Changing your FTP password To change the FTP password: . Address: This is the domain name or IP address of the FTP server. Once you enter your information you can click connect to initiate the connection process. Fetch. Cyberduck. FTP 6. Address: This is the domain name or IP address of the FTP server.6. Click the FTP manager icon.3 Connecting to a FTP client Using a FTP client can be very simple to use. Password: A password is also required unless you are using anonymous FTP. Password: A password is also required unless you are using anonymous FTP. including the following Filezilla. Port: 21 is the most commonly used port for FTP connections. Many web publishing applications use FTP to connect and upload to the web server. Most FTP clients are compatible with our service. Publisher and FrontPage. Dream weaver. - 23 . Port: 21 is the most commonly used port for FTP connections.After starting up your ftp client you should be given an area to enter your logon information. CuteFTP.

1 What is it? The simplest way to authorize your friends or colleagues to work with particular directories of your account is to create FTP sub-accounts. 24 . At the bottom of the page that shows. which gives full FTP permissions to a single directory. No dedicated IP is required for FTP sub-accounts.6. without giving access to the root directory.You will see two views the local and the remote view. .You can upload or download a file by double-clicking on it.Click the FTP Manager icon from your control panel.2 Setting up an FTP sub-account To create a new FTP sub-account: . . just select a tree item in the appropriate tree.5 How to transfer files Transferring Files into Filezilla: .Navigate the local view to the location of the files you wish to upload. An FTP sub-account is a combination of a username and a password. It will be added to the transfer queue and the transfer will start automatically. 6.6 FTP sub-accounts (Linux) 6.Navigating the files and folders in Filezilla is very similar to using the file manager on your home computer. other directories or the control panel. . 6. . To change the current folder either on your machine or on the server.Navigate the remote view to the location you would like to place the files you upload.6.Alternatively you can also drag the files from one side and drop them on the other side. 6.4 How to navigate files Navigating in Filezilla: . find FTP sub-accounts and click the Add icon.6.

Virtual FTP users log right into your root. and the directory this user will be restricted to. make sure you have a dedicated IP.- On the next page. . 6. FTP subusers will have access to your whole home directory.On the page that appears.7. Once complete you can click the edit icon beside an existing username to see the details of that user. 25 . Also. click the domains icon. add a server name for the new virtual host.1 Enabling Virtual FTP .On your control panel page. The directory must be relative to your home directory.If you have several domains. - Transfer FTP: This shows the amount of traffic used by an individual ftp sub-account user. 6. enter the FTP login and password that will be used by this other user. You can give your Virtual FTP users access to more than one directory and specify a different set of permissions for each directory. Enable FTP for this domain: - On the next page. enter the e-mail address by which FTP users can reach you with questions or comments. If you leave the directory field empty. which can be used in place of the domain name to log on. .Go back to your control panel page and click the FTP service icon. but can enter only those directories you allow them to enter. . This name will appear in the welcome message when guest users connect to your server with FTP clients. choose the one you wish to enable virtual FTP for. Home Directory: /hsphere/local/home/(ftpusername)/(folder name) Host Name: The host name is the direct web server address.7 Virtual FTP Virtual FTP provides more possibilities than a FTP sub-account.

6. If you haven't granted the same permissions to all your Virtual FTP Users. List: check to allow viewing / browsing the contents of the directory. Click the Edit icon next to the directory you have just created. you will have to define permissions on this directory individually for each Virtual FTP User. It is usually used jointly with Read.2 Add a FTP user . specify permissions to this directory: - Read: check to allow file downloads from this directory. you can specify permissions for each of them individually.Click the Add icon for Virtual FTP Users and create a new Virtual FTP User: - Click the Add icon for Virtual FTP Directories and enter the name for the new Virtual FTP Directory: - End it with a slash. include the path. Grant Permissions to all users: check to grant these permissions to all your Virtual FTP users. On the same page.g. The location must be specified relative to root.: Dir1/. e. To create a virtual FTP directory inside a different directory.Click the Edit icon for FTP for this domain . If you leave this property unchecked. 26 . for example Dir1/UserDirs/. Write: check to allow file uploads to this directory.7.

.- If you have chosen to grant the same permissions to all users.Enable Anonymous FTP .1 Configure anonymous FTP: Skip this step if you are already using a dedicated IP. and its content can be viewed and downloaded. you can skip this step. switch to dedicated IP.If you have several domains.At the bottom of the FTP virtual server page you will find a new option to enable anonymous FTP upload facilities: 27 . 6.On the page that appears.8 Anonymous FTP This feature allows you to give public FTP access to a dedicated directory in your account. Skip this step if you have already enabled Virtual FTP.Go back to your control panel page and click the FTP Service icon.On your control panel page click the domains icon .Enable FTP for this domain: - On your control panel page. A special directory is created in your root. . choose the one you wish to enable virtual FTP for. enable Anonymous FTP Upload Facilities by doing the following: . 6. .8. but not uploaded. click FTP Service. 6.9 Anonymous FTP Upload Facilities If you want to allow anonymous FTP users to upload files. Anonymous FTP becomes available only after you create a Virtual FTP server. then enable Anonymous FTP for the domain you want: You can also enable Anonymous FTP on the FTP virtual server page. .

so you can not downloaded or viewing the content.NOTE: This will create a dedicated directory inside the Anonymous FTP directory. 28 . The Uploads (Windows based plans) / Incoming (Linux based plans) directory will have only 'upload' permissions.

demo. NOTE: URL path must be an absolute path.html as the directory index.demo.com/products to the http://www. With this feature you can redirect visitors from one URL to another. only to a different domain or IP address.7. 7. 7.html Example: If a visitor goes to your site http://www.1.1 Site settings The site settings allow you to control many features of your website. Make sure to enter the full list of indexes you would like to have in your configuration.html page.php default. You can specify multiple index pages in case different folders have index pages of different names.com/welcome.1 Redirect URL This allows you to redirect your domain to a different domain or IP address.com/products in the “Redirect from:” field and http://www. In other words.demo. it will redirect visitors of http://www.2 Directory index This allows you to set your own index pages instead of the one we have set as default. if you set welcome.1. Example: If you were to put http://www. the first page to open will be http://www.example.com/new_products.com/new_products. However. 29 . Default index pages index.html.html in the “to” field. not a relative path. It is not possible to use this method to redirect to a sub pages within the same domain.demo.example. Adding features to your website 7.html.example. you can tell your visitors' browsers which page to load when they type your base domain name (http://domainname.html index. When a visitor tries to connect it will redirect them to the address specified here.com.com/). the page to open will be http://www.com/index.

html. Switch the radio buttons to enable or disable this option.html index.php). and an icon indicating the types of file included.Set the title and main header to "Index of dir" .Select the domain if you have more than one. size. - 7. the server looks for a file called index.A list of the files in this directory.html. enter the names of the files that will be treated as indexes. Enabled/Fancy: When pointed at a directory.1. - - At the top of the Web Service page. − The first file is "Parent Directory".On the control panel page. do the following: . the system can automatically control what is displayed. click Web Options. scroll down and find the directory indexes option and turn it on. If it's pointed at a directory that doesn't have an index. − Each file name is a link to the file. click the Apply link for the Server configuration to change. index.The header file for this directory. Put file names in descending order of priority and separate them with spaces (e. Disabled: This causes the server to refuse to list the files and folders of a directory if an index file is not found. that is what is sent back. click the Edit icon next to the Directory Indexes. 30 .bin about. On the Web Service page.To set your custom directory indexes. On Windows hosting these changes will happen immediately. − Last modification date. To edit the list you have made.html cgi.g. If for any reason it is corrupted or missing. In the box that appears. if any . . the server will perform "fancy indexing" and return the following HTML: .3 Directory indexes The index page is the first page entered on your site. if found. The changes will take effect within 15 minutes.

. click Web Options. you need to be slightly familiar with the server returned error codes: To configure Error Pages. 7. do the following: . . Htprotect is a feature which is located inside of WebShell: To add password protection to a directory.On the Web Service page.4 Error pages Use this utility to define what will be done if a requested page on your site is missing or fails to open for any other reason. HtProtect utility allows you to password protect any directory on your site so only authorized visitors can open its content with their browsers.1.1.On the control panel page. Type: Specify if the text in the previous field must be treated as a URL (Redirect) or as a text message (Message).NOTE: We recommend you keep this option to disabled and instead keep an updated index file that list the files stored in your site. .In the form that appears. Windows users will get a slightly different form: 7. scroll down to find the Error option and click the Add icon on its right. do the following. enter the error document settings: Message or URL: Enter the message the visitors will get or the URL of the page that they will be taken to if the requested page is not found. In order to specify your own Error Documents.Select the domain if you have more than one.5 Htprotect / Htaccess NOTE: HtProtect is only available on Linux hosting packages. 31 .

Once you have added the needed users use the close button to go back to the previous screen. - Group files are used if you need multiple people or groups of people to have access to a resource. This will open a new window that allows you to select the directory you wish to apply the protection to. Once you click on this you will be given two different options which would be to close or create. You can also list the users who specifically have access.Htaccess information to the page labeled optional.- On the control panel page. click the Webshell3 icon. The default supplied valid user requirement is usually the best choice for the novice user. You can add any external . - - - - 32 . also if you already have users you can edit or delete those as well. This is optional and usually only required by advanced users. - On the top navigation menu select the button which says protect.

do the following: .1. - An overview screen will appear on which you can see all your information.Select the domain if you have more than one. scroll down to find the Server Side imagemap option and click the add icon on its right. Enter the file extension beginning with a dot: 33 . . prior to clicking the save button. the server checks the file with the specified extension to define the links of an image (unlike a client-side image map. Click the save icon on the left. - Your changes should take affect immediately.- The Htprotect file must be saved to take affect. To add an imagemap file extension. 7.6 Server side imagemap This feature allows your server to regard files with a specific extension as map files. which uses the info inserted into the HTML code) and reports back to the browser where to go. . In other words.On the Web Service page.On the control panel page. click Web Options.

Ports are typically used to map data to a particular process running on a computer.8 Ports A port is a special number present in the header of a data packet. 34 .1.7 Paths Linux Perl /usr/bin/perl ImageMagick /usr/X11R6/bin/ (/usr/X11R6/bin/mogrify) Convert is at /usr/X11R6/bin/convert Identity is at /usr/X11R6/bin/identify PHP /usr/local/bin/php Sendmail /usr/sbin/sendmail Date /bin/date Python /usr/bin/python Python2 /usr/bin/python2 CURL /usr/bin/curl Ffmpeg /usr/bin/ffmpeg Home Directory /hsphere/local/home/<username> Replace <username> with your username Windows Perl c:\perl\perl ImageMagick c:\Program Files\ImageMagick Home directory D:\home\<username> Replace <username> with your username 7.7.1.

On the control panel page. The MIME type must comply with MIME type specifications. scroll down to find the MIME type option and click the add icon on its right. .On the web services page.110 SMTP .Select the domain if you have more than one.1.On the web services page.Below is a list of commonly used open ports on our network: HTTP – 80 HTTPS .143 mySQL .3306 PostGreSQL .gif graphics files.Select the domain if you have more than one.10 Error logs If you turn the error logs icon on it will keep a history of the errors received from scripts ran on your site. This is the directory to place all your CGI scripts. 7. To add a CGI alias. .443 POP3 .: text/rtf or video/mpeg. .9 MIME types This utility allows you to define file formats that are not defined in web browsers. 35 . e. scroll down to find the cgi-bin option and turn it on. just like it displays simple text files and . .5432 MSSQL .25 IMAP . . 7. you will need to create a CGI alias or. This enables the browser to display or output files that are not in HTML format. To add a definition for your own file format.On the web service page. for instance Perl.1 CGI scripts To add CGI support.2 Adding support for dynamic web content 7. you can specify that all .cgi files must be treated as executable Perl scripts.1. specify a CGI file extension and a CGI handler for it. For example.1433 FTP – 21 7. in other words.On the control panel page. scroll down to find the CGI option and click the add icon to the right. click web options. do the following: .On the page that appears. do the following: . enter the extension for the file type: Begin file extension with a dot. Now all files in the cgi-bin directory will be treated as CGI executables. click web options.2. .g.

Skip this step if you are using a Windows-based plan.NET in a Windows-based account.On the web service page. click web options. . .2. click the apply link for the server configuration to change. . To add PHP support.NET option and turn it on. scroll down to find the ASP option and turn it on.php4. . scroll down to find the ColdFusion option and turn it on.Select the domain if you have more than one. click web options. 7. . click web options. Select the domain if you have more than one.2 PHP scripts You can add support for your own PHP scripts.5 ColdFusion To add ColdFusion support in a Windows-based account.Select the domain if you have more than one.Select the domain if you have more than one. do the following: .On the web service page. enter an extension for your PHP pages beginning with a dot. If you need to add custom file extensions to be handled by ColdFusion. 7. click web options. scroll down to find the PHP option and turn it on.NET To add support for ASP. The changes will take effect within 15 minutes. . . click the Add icon that has appeared next to the PHP option: 36 .3 ASP To add support for ASP (Active Server Pages) in a Windows-based account. do the following: . On the web services page.2.4 ASP. for instance . scroll down to find the ASP. .On the control panel page.2.On the control panel page.2. do the following: On the control panel page.- Enter an extension beginning with a dot and select the handler from the list: 7.On the page that appears. click the add icon that has appeared next to the PHP option. . do the following: .At the top of the web service page.On the web service page.On the web service page. Select the MIME type from the list. 7.On the control panel page.

7.On the control panel page.- On the page that appears. you can specify that all . do the following: . do the following: . 7.shtml files must be treated as server side includes.html as an SSI file extension will cause many problems.2 Guestbook To add a guestbook to your site. click the apply link for the server configuration to change. . click web options.On the web services page. click the guestbook icon. - In the window that appears.Click the view icon for more instructions. 37 .6 Server Side Includes You can add your own SSI file extensions. For example. NOTE: Adding .2. scroll down to find the SSI option and click the add icon on its right. do the following: . Webalizer and many other scripts will cease to function. click the counter icon.Enable the counter for domains in the list.Enable the guestbook for domains in the list.On the control panel page.1 Counter To add a counter to your site.3 One click install scripts (Linux) Owners of Linux accounts can use simple CGI wizards to enhance their sites with the following scripts: 7.Click the edit icon for the domain you wish to edit. 7. . . The changes will take effect within 15 minutes. . enter an extension for your PHP pages beginning with a dot. .3. enter your SSI file extension beginning with a dot: - At the top of the web services page. To add a SSI file extension.On the control panel page.3.

.Private or public forums . . .3 Formmail To add a Formmail script to your site. . phpBB has a user friendly interface. You'll be prompted to either create a new MySQL database or select from the existing databases for phpBB to use.Click the view icon for more instructions. fully scalable.Private messaging system .3.Click the view icon for more instructions.Complete customization with templates To add phpBB forum to your site. . click the chat icon.On the control panel page. simple and straightforward administration panel.3.5 PhpBB (Linux and Windows) phpBB forum (distributed according to phpBB License Agreement) is a high powered.3. WARNING: Assigning a previously created MySQL database to be used for phpBB. where you can start configuring 38 .On the control panel page. click the Formmail icon. will remove the contents of all its tables.Unlimited forums and posts . . click web options.Powerful search utility . do the following: . do the following: .- Click the view icon for more instructions. phpBB Key Features: .On the control panel page. 7. and helpful FAQ. and highly customizable bulletin board package. do the following: .Enable chat for domains in the list.Enable the Formmail for domains in the list. scroll down to find the phpBB option and turn it on: - This will start the installation wizard.On the web services page.Multiple language interfaces .4 Chat To add a chat to your site. 7.Click the edit icon for the domain you wish to edit. 7. Click the setup icon to install the script: - You'll be taken to the phpBB admin control panel.

As with any action please insure you have a backup of all your web files and databases. .3.3. . a utility that searches your site by keywords.conf.On the control panel page. you can enhance your site with mnoGoSearch.Select the domain if you have more than one. refer to indexer. Go to your search page by clicking the magnifying glass icon: NOTE: It will take some time to index your site pages and get your search working.6 mnoGoSearch If you are on a Linux account. delete the unnecessary files and restore the scripts. click the restore to default link.g.conf dist which can be found in the /'account'/mnogosearch/'domain'/ directory. WARNING: This will delete the CGI scripts and index pages of your website. You can extend your mnoGoSearch capabilities (e. do the following: . For more information on working with indexer. 7. will remove the contents of all its tables. . you can always restore mnoGoSearch configuration to the default by clicking the Edit icon. 39 .html). To fix/restore the scripts: .the forum to your liking.On the control panel page. scroll down to find the mnoGoSearch option and turn it on: - This will start the installation wizard. WARNING: Assigning a previously created MySQL database to be used for phpBB. 7.On the web service page. .Click the edit icon for the domain you wish to edit.On the web service page. but all your custom settings will be lost. but its configuration files are located in the mnoGoSearch/ directory in your root. you can restore them to default. To enable mnoGoSearch. mnoGoSearch script file is stored in the cgi-bin directory.: set local charset) by editing file indexer.7 Fixing problem scripts If you have accidentally deleted any of your CGI scripts and/or the initial account index page (index. click web options.conf. click web options. To get rid of any undesirable changes in you CGI scripts and go back to the default settings. which can cause damage to your site. You'll be prompted to either create a new MySQL database or select from the existing databases for mnoGoSearch to use. If you mishandle anything.

4.Click submit .3.2 Configuration To configure FrontPage formmail settings in Linux or Windows based accounts: .4.Now that you have applied your changes. These script files are usually placed in the cgi-bin folder of the specific domain. Make sure you only download scripts from trustworthy locations. 7.1 No extensions found on server or unable to connect to server .On the page that appears.7. . click the FrontPage icon.Click the Edit icon right beside the fix icon. A republish may be required to correct any problems.4 FrontPage extensions The FrontPage extensions work as a conduit for FrontPage to connect and publish your site to our servers. 7.1 Installation WARNING: If you turn off FrontPage extensions after they are configured and your site has been published this will delete needed files and corrupt some aspects of your site.First make sure the FrontPage extensions are configured and the connection to the server is correct. make sure to supply the sender and reply to e-mail addresses. They will be used in FrontPage mail forms 7.4 How to resolve common errors 7.Now you can proceed to FrontPage configuration. If your FrontPage publish fails to perform correctly.8 Adding custom CGI scripts (Linux and Windows) You can install almost any script on either our Windows or Linux hosting packages. A republish may be required to correct any problems.Enable FrontPage Extension for domains in the list. .On the control panel page. click the FrontPage icon. 7. It's a good idea to install and fully configure Front Page Extensions prior to uploading your web pages. make sure to supply the sender and reply to e-mail addresses. try reinstalling FrontPage Extensions by doing the following: . 40 .3 Fixing problems WARNING: If you turn off FrontPage extensions after they are configured and your site has been published this will delete needed files and corrupt some aspects of your site.On the page that appears. 7. .4. .4. . click the FrontPage icon. To install FrontPage extensions.On the control panel page. .On the control panel page. It is also important to read all accompanying documentation for proper use and installation instructions.4. .Click the edit icon in the FrontPage section.Click the Fix icon in the FrontPage section. .4. They will be used in FrontPage mail forms. do the following: . It is also required to provide some of the advanced server side functionalities offered by FrontPage. you can upload your web pages.

.4. and then click OK. type Feedback. .In the folder list.Click Browse. − Switch to HTML view.3 Forms If you have problems with a FrontPage form a common problem and solution is described below. .Locate the Feedback. .com is correct.4. and then delete all the HTML code. If these do not resolve the problem.cnf is an Authentication file. Go to publish site in FrontPage and verify the domain name is set without the ‘www’ prefix.Save the form page.cnf file and may resolve the problem. expand the _private folder that is in the root of your Web site. − On the General tab. It can become corrupt and cause problems with a running site or at publish time. − Under New form template. click All Files (*. http://www. click New. The following options should resolve the problem. Say.Right-click the form. This causes it to recreate the We80. . . click Save.cnf We80. http://yourdomain. 41 . then click Form Properties. .txt file.yourdomain. and then turn the extensions back on in your control panel.- Make sure the site is accessible and the domain name is registered and has not expired. If you are still having problems try using the fix tool from the Front Page icon on your control panel.Open the page that contains the feedback form.Click the Feedback.txt. - - 7.4. The task pane opens.In the Email address : type the email address which you provided while enabling FrontPage extensions .txt file. . click Page Templates. − Locate and then double-click the _private folder that is in the root of your Web.com is not correct.4. follow these steps: − On the File menu. 7.*). If this does not work try turning the Front Page extensions off. try to turn the front page extensions off and back on and then reconfigure. and then click OK. − In the Save as type box. and then click Page or Web.2 We80.Locate and then double-click the _private folder that is in the root of your Web. − On the File menu. If you can’t locate this file. − Click Save. . click Normal Page.Try using the configure option to change the FrontPage user name and password and then changing it back. − In the File name box.Open your Webpage in FrontPage. . deleting all _vti folders and folders starting with “_” in your domain directory.

If the delay would exceed maximum. The period specifies how long data is accumulated before the counters are reset.Complete the wizard. . Original: Impose a limit on the volume (Kbytes sent) per period. We do however offer throttle policies to help you regulate the amount of traffic you receive. the request incurs a calculated delay penalty or is refused. Otherwise the request is delayed between one and the set maximum number of seconds.Select the type of policy and click submit. First. 8. then the request is refused entirely to avoid occupying servers unnecessarily.8. if the idle time between requests exceeds the minimum. do the following: . . . then the counters are reset. . Document: Excluding requests for HTML page elements such as images and style sheets impose a limit on the number of requests per period. all further requests are refused. click the apply link. If your account reaches its limit in a given month your account is subject to suspension. until the elapsed time exceeds the period length. Idle: Impose a minimum idle time between requests. When this limit is exceeded. which when exceeded the request incurs a counter-based delay penalty or is refused. at which point the elapsed time and the counters are reset. . Note that the requests (hits) column of the throttle status display does not include the requests for page elements.Scroll the page to find the throttle policy option and turn it on. whenever the 42 . First.1 How do I change the traffic limit? Traffic limits are set per plan and can’t be changed. The delay is computed as the policy minimum less the idle time between requests. whenever the elapsed time exceeds the period length. The eight throttling policies are: Concurrent: Impose a limit on the number of concurrent requests at any one time.At the top of the web service page.2 Throttle policies To enable the Throttle module.On the control panel page. Managing traffic 8. When the minimum is not reached. We unfortunately are not able to offer any custom changes or accommodations to our plans.Click the edit icon for the domain you wish to edit. Second. click web options. then the request proceeds without delay.

Second. then all requests are accepted. Random: Randomly accept a percentage (limit) of the requests. in which case the request proceeds without delay. whenever the elapsed time exceeds the period length. then the delay counter is decreased by one second if it is not yet zero. Otherwise the request is delayed between one and the set maximum number of seconds. The period specifies how long data is accumulated before the counters are reset. The delay is computed as one plus the integer result of the volume times 10 divided by the limit. at which point the elapsed time and counters are reset. if the volume is below the limit. Second. If the delay would exceed the maximum.elapsed time exceeds the period length. When this limit is exceeded all further requests are refused until the elapsed time exceeds the period length. Otherwise. Request: Impose a limit on the number of requests per period. also the period length is deducted from the elapse time. When this limit is exceeded all further requests are refused. you refuse the request entirely to avoid occupying servers unnecessarily. You can also set throttle policy to none which imposes no restrictions on a request and used as a place holder to allow monitoring. the delay counter is increased by one second. when the limit is exceeded. then every request is refused. Speed: Impose a limit on the volume (Kbytes sent) per period. If the percentage is zero (0). First. if the volume is below the limit. Volume: Impose a limit on the volume (kbytes sent) per period. which when exceeded the request incurs a calculated delay penalty or is refused. Remember to apply the changes you have made. The delay can be between zero and the set maximum number of seconds. until the end of the period at which point the elapsed time and counters are reset. 43 . The period specifies how long data is accumulated before the counters are reset. then the limit (allowance) is deducted from the volume. if the percentage is 100. after which the request will be refused to avoid occupying servers unnecessarily. then the volume and elapsed time are halved. which can’t be a negative result. The limit currently serves no purpose. Press Apply in the Web Service -> Server Configuration row.

At the bottom of the page that appears. enter its new size in megabytes. When mail is sent to your email address it is delivered and stored in this email mailbox. 9. 9. Password: Click the icon to change the mailbox password.1. Mailbox quota is not related to the site disk space quota. You will see the list of its properties on the right: Quota: Change the quota for this specific mailbox. click the Edit icon next to the name of the mailbox. To change your mail quota.com.com.1.1 Mailboxes An email mailbox is similar to the mailbox at your home. any email messages sent to a nonexistent account on your domain will go to this address. E-mail 9. If no account were marked as catch all. You will be presented with a drop down list in which you can use to choose mail forward.1 Creating a Mailbox To add a new mailbox.com is marked as catch all.Enter the name and password for the new mailbox and click submit: NOTE: If you want your mailbox to work as a forward and mail auto responder at the same time.2 Configuring a mailbox To configure a mailbox. . 44 .Choose mailbox from the drop-down list and click next: . which doesn't exist.On your control panel page. In this case. mail auto responder. you can give forward. Example: your mailbox webmaster@example. do the following: . this particular message will arrive at webmaster@example. IMPORTANT: The postmaster email box is a mail box which you can neither delete nor change its quota. Catch All: If it's on. click e-mail. your mailbox will forward all incoming email to another address and send responses to senders. However the webmaster email box works as normal and counts towards your total email box limit. mailbox and auto responder the same name within one mail domain by following the same steps you used to create an email address. click add new mail resource: . this message would bounce back to the sender with an error notification.9. However this can’t be increased over 2 gigabytes of space with any email account. If someone sends an email to support@example.

2 Change password from the login page If you go to manage.Web Mail: If you click the launch button.4.ixwebhosting.You will have options on the right hand side. 9. first switch catch all off. .1 Change password from the control panel Change email box passwords. Delete: Delete the mailbox.1. NOTE: To delete a catch all mailbox.From the control panel.com.domain. Discard all incoming mail: Turn this on only if you are absolutely sure you don't need all your incoming mail. .Click on the email box for which you would like to change the password.You will see an icon which says password there you will be able change your password.1. This can also be accessed at mail. . . You can also turn it on when you are going on vacation. a new browser window will open our webmail interface. This is where you will send and receive you email. .4.2 Configuring email clients 45 . Senders won't receive “undelivered mail” notices. 9.com there are a few options so you can change your email box password as well as log into your web mail.1.3 Changing mailbox password 9.Select the domain in the drop down box at the top and click go. Only use this if you do not want to receive messages. 9. Trouble Ticket: This will open the help desk to report any issues you have been having with your email. click the email icon.

Click “add account”.The program will prompt you for the email password.2. choose POP3 as your incoming server. .Select the domain.Your incoming username will be your full email address. . if you have more than one.2.You can setup either POP or IMAP mail service. 9. the first time it tries to connect. . .com or the direct mail server address.Note the mail server address. . if you have more than one. .When the wizard starts.On the page that shows.Enter your email address. email address and password.1 Configuring Thunderbird To find your email information: .2 Configuring Outlook Express To find your email information: . . For the example we will use POP. email address and password. .Start Outlook 2003 and either follow the install wizard or go to the tools drop-down menu and select accounts.Note the mail server address.From your control panel click the email icon. . the settings are very similar.Enter the mail server address.9.Select the domain. if you have more than one. .Enter the mail server name for both incoming mail and outgoing mail. . which is either mail.Select the domain.Click “add” and select mail. .Start Outlook Express and either follow the install wizard or go to the tools dropdown menu and select accounts.Enter the mailbox password in the password field.Enter the name you would like your messages to appear from . 9. . . To configure email in Outlook 2003: . To configure email in Mozilla Thunderbird: . .From your control panel click the email icon. . .Select to setup POP3. To configure email in Outlook Express: . .In the drop-down box.Click finish to save settings. enter your email address and click next to proceed. .Note the mail server address.Make sure to enter the full email address in the account name field. email address and password.Check the remember password box to avoid entering it every time you check or send email.2.domainname.Enter your email address. .Enter the name you would like your messages to appear from. enter the name you would like your messages to appear from.3 Configuring Outlook 2003 To find your email information: . . . 46 .From your control panel click the email icon.Start Thunderbird and either follow the install wizard or go to the tools drop-down menu and select accounts. . .

2 Configuring a Forward To configure a forward.3. Remote e-mail address: The address your mail will be forwarded to. create the forwarding rule. Test the connection to see if you get everything is setup correctly.3.com or the direct mail server address for both the incoming mail and outgoing mail. Click finish to save settings. click Add new mail resource. Then select the very last option to log on to incoming server before sending mail. Local e-mail address: The address your mail will be forwarded from.At the bottom of the page that appears.Select the domain in the drop down box at the top and click go. Enter the mail server address. do the following: 47 . Click more settings and then outgoing server. Select my outgoing (SMTP) server requires authentication. - Choose mail forward from the drop-down list and click next: - On the page that appears.domainname.3 Forwards You can have any or all your email forwarded to an outside email account. click the email icon. 9. which is either mail.1 Creating a Forward To create a forward.From the control panel. 9.- Enter your full email address for your user name Enter your account password. 9. . do the following: . Click ok to more settings. .

Click on the email box for which you would like to change the forward. . click the email icon. click the email icon. Delete: Click the trash can icon to delete the forwarding rule. .3 Forwarding to multiple addresses To add more than one destination address to a forward.Click the edit icon in the remote field. .org).- From the control panel.com. If you mark this forward as catch all. . incoming mail will be forwarded to webmaster@example. Trouble Ticket: This option opens the ticket center where you can get technical assistance with any email problems. .From the control panel. The mailing list feature is implemented through EZMLM mailing list manager (www.com.3. which doesn't exist. Select the domain in the drop down box at the top and click go. . . then click add new mail resource. click the email icon. . 48 .4. If this forward wasn't marked as catch all. this message would bounce back to the sender with an error notification. 9. do the following: . Example: You have a forward from president@example.ezmlm.From the control panel. Remote: Any local or external address your mail is forwarded to. This will open its properties on the right: Local: The local address your mail is forwarded from. Click on the email box for which you would like to change the forward.com pointing to webmaster@example. 9.Choose mailing list from the drop-down list and click next: - Enter e-mail address: This is the e-mail address from which mail will be forwarded to subscribers.Select the domain in the drop down box at the top and click go.Select the domain in the drop down box at the top and click go.com. this particular message will still arrive at webmaster@example. If someone sends an email to support@example.Enter another destination address.1 Adding a mailing list . any email sent to a nonexistent account on your domain will be forwarded to the remote addresses.com.This will open its properties on the right. Catch All: If this is on. 9.4 Mailing lists Mailing lists allow you to send mail to multiple users.At the bottom of the page that appears.

Click on the Mailing list you would like to add subscribers to.From the control panel. .Select the domain in the drop down box at the top and click go.Important: You can only enter a new e-mail address.You will have the option to add a single subscriber or a batch of subscribers one per line. .5 Adding moderators to your mail list To add moderators to your mail list: .From the control panel. click the email icon.Click the trash can icon to the right of the subscriber you would like to delete or click the remove all icon to remove all subscribers.4.This will open its properties on the right.This will open its properties on the right. .Select the domain in the drop down box at the top and click go.From the control panel. click the email icon.4 Removing subscribers To remove subscribers from your mail list: . . . . . .Click on the mailing list you would like to add a moderator to. . .Select the domain in the drop down box at the top and click go. .Click the edit icon to the right of subscribers. 9.Click the add icon to the right of subscribers. 9.Click the add icon to the right of moderators.4.This will open its properties on the right. 9. first delete the resource that uses it.Click on the Mailing list you would like to edit subscribers of.2 Configuring a mailing list 9.3 Adding subscribers to your mail list To add subscribers to your mail list: .You can add moderators as you see fit. 49 . .4. . If you need to use an existing address. . click the email icon. .4.

No editorials. Digests contain each message as it was sent out by the list. 50 . digest subscribers are automatically given the same privilege. This will attempt to describe the different elements of the configuration to assist with securing your mailing list. click the email icon. but not to participate in the discussion.4. . or who just want to see the discussion of a specific question can retrieve a specific set of messages from the archive. .Click the trash can icon to the right of the moderators you would like to delete or click the remove all icon to remove all moderators. Digest - The digest is a special kind of mailing list extension. Block Archive - You can prohibit the overall access to the archive and authorize only moderators to get in. This way. For instance. . Digest is sent out when a predetermined time or traffic limit has been reached.This will open its properties on the right. Receiving digest is very convenient for users who want to follow a list.7 Securing your list Mailing list software is notorious for allowing its members to get inundated with spam if configured wrong. 9. no missing messages.Click the edit icon to the right of moderators. Archive - By default.9.From the control panel. all messages sent to a list are kept archived.Select the domain in the drop down box at the top and click go. . .6 Removing moderators from your mail list To remove moderators from your mail list: .4. Instead of sending separate messages. subscribers who haven't been following the list for a while. If the list owner has chosen to restrict posts and archive access to subscribers. it sends out a collection of messages ordered by digest subscriber’s collections of messages. subscribers can later retrieve messages from the archive.Click on the mailing list you would like to remove moderators from.

- Prefix - Check "no prefix" to prohibit adding prefix to the subject line of each message that does not already contain it. to include the prefix. This verification mechanism tests if the person at the subscription address really wants to be a subscriber. If you want the subject line of each message that does not contain it. Subscription confirmation - Usually an applicant for subscription (your_mailinglist-subscribe@domain. This just indicates if the user is required to confirm their unsubscribe request. List subscribers 51 . one should just reply to the message. Non-subscribers' requests will be rejected. recipient's address is added to the database and he becomes a subscriber.com is called your_mailinglist-digest@domain. place the text in the file DIR/prefix Guard Archive - Here you can restrict the access to the mailing list archive by allowing only subscribers to retrieve the archive. You use the same commands to work with digest as you do when you work with the main list.com. You can always include or exclude confirmation from the subscription procedure. To confirm it. The only difference is that you use your commands with 'digest' indication. Unsubscribe confirm - Unsubscribe confirmation is basically the same as the subscription process.com) is sent a confirmation request. When it is done. the digest list for the mailing list your_mailinglist@domain.- From the subscriber point of view.

In reply to this command. instead of going directly to the list (to send messages to the list. Replies are sent only if the target address is a remote administrator. The cookie becomes invalid as soon as the file has been changed. even if the other file has exactly the same contents. If the message is accepted. ezmlm replies to the -edit command with a list of the files in dir/text/. On a message moderated list. They can accept or reject. Also. it is sent to the list unmodified. and contents of the file are added to the “Reply-To:” address. On moderated lists it may take a little longer for the message to reach all the subscribers. Remote administrators can list this log or search it for specific entries. are sent to one or more moderators.com. This is however recommended as it will stop your members from receiving spam. If the list is called mailinglist@domain. Still. listing this file allows the remote administrator to see recent additions and removals. Only files where editing seems reasonable are included in the list.- Mailing list users are not allowed to list the addresses of all subscribers.com). messages. the cookie can’t be used to edit any other file. A “cookie” based on the date. but not modify the message. since it has to be read and approved by at least one moderator before being sent out to the subscribers. ezmlm sends a message with the file and editing instructions. whichever is shorter. just send a message to mailinglist@domain. Message moderation - The list owner may set up the list to be message moderated. Text file - Here. file name. you can allow remote administrators to edit the text files that make up most of the ezmlm responses. it is e-mailed back to the sender. For example. Posts from addresses other than moderators 52 . The subscription log stores entries for each modification made to the subscriber database. With this switch. The remote administrator can edit any file in dir/text/ by sending an e-mail containing the new text to edit the file with. If it is rejected. or after 27 hours. you can allow a remote administrator to get it. one must know its name. optionally with an explanation from the moderator.

The –request allows commands to be sent in the subject/body of an email. so they will only receive messages posted by moderators. This way you don’t have to send the command in the email address itself. Respond to admin - If you enable this function. search for subscriber addresses by name. archive will be accessible only to the remote administrator. Otherwise. Depending on how the list is configured. This is usually chosen to send announcement or notifications where the interaction between recipients is not intended. For more information on this. users will be required to request to the remote administrator in order to retrieve mail list archives. Enables remote administration - A remote administrator is an address with the rights to do certain administrative tasks remotely by e-mail. refer to the ezmlm documentation on the ezmlm-request command. add and remove subscriber addresses and/or edit the texts that are sent in reply to list commands.- Here you can disable posting by subscribers to the mailing list. remote administrators may have the right/ability to list subscribers. Request address is serviced - Enables/Disables the -request command. Subscription moderation 53 .

i.e. One becomes a subscriber only after his request has been approved by a moderator.4.5 Mailbox alias A mailbox alias is a way of having mail arrive to a mailbox other than or in addition to the mailbox it was being sent to. 9.From the control panel click the email icon.8 Requesting white listing If you are using the ezmlm mail list or if you have a web based mail list script and you notice trouble there may be a simple solution.com is created.- Mailing lists may use subscription moderation.5.1 Adding/Removing a mailbox alias To add a mailbox alias: . User posts only. If you feel this needs to be completed please place a ticket providing the following information and the administrators will take your request into consideration. he replies to the “Reply-To:” address.At the bottom of the page that appears. except that after confirmation the request is passed on to the list moderator. What application is being used to send your messages? Which email address. In this case posts received from non-subscribers will be rejected and sent back. where bounces are collected)? 9. . . This is done by our administration staff only through our 24/7 Help Desk. If you have a mail list or a script that is sending more than 300 messages a day there is a possibility you may need to be white listed on our mail servers.Choose mail alias from the drop-down list and click next: 54 . an email address info@domain. It is like having 2 email addresses assigned to the same mailbox. click add new mail resource: .com to the same mailbox. - You can set up your mailing list to allow posts from subscribers only. 9. For instance.Select the domain in the drop down box at the top and click go. The user also wants to be able to receive mail from information@domain. How many messages will you be sending to send per hour/day/week? Describe your policy regarding the treatment of bounced messages. Subscription to these lists is identical to the process described above. will be shown as the return-path in list messages (the address.

.From the control panel click the email icon. . the system will immediately send a uniform response back to the sender.To remove a mailbox alias.At the bottom of the page that appears. .Use this form to compose an auto response message: 55 .6 Mail auto responders 9. Whenever a message arrives in a mailbox.Click the “trash can” icon next to delete.6. . do the following: . To add an auto responder.From the control panel click the email icon. do the following: . click add new mail resource: .Click on the mailbox alias you would like to remove.1 Adding an auto responder An auto responder is a mailbox attribute. .Select the domain in the drop down box at the top and click go.Select the domain in the drop down box at the top and click go.This will open its properties on the right. 9. .

Select the domain in the drop down box at the top and click go.Go to manage.7. .6. 56 .From the control panel click the email icon.com.2 Editing an auto responder message To edit an auto responder.From the control panel click the email icon.1.This will open its properties on the right. . 9. .This will open its properties on the right. . 9.1 How to use 9. do the following: .1 Login from the control panel Login from the control panel: .Select the domain in the drop down box at the top and click go.Click the “trash can” icon next to delete.7.Click the “launch” icon to the right of webmail.1.3 Removing an auto responders To remove an auto responder.Click the edit icon next to message.Select the domain in the drop down box at the top and click go. . .Click on the auto responder which you would like to remove. 9. .From the control panel click the email icon.Click on the corresponding auto responder. .7 Webmail 9.6.7. . Subject: The subject of the response message Message: The body of the response message 9. do the following: . . . You will see an option to access your webmail account.This will launch the webmail interface in a separate window.Click on the email box which you would like to login to.Send a Copy To: The option e-mail address to which copies of response messages will be e-mailed.ixwebhosting.2 Login from the login page Login from the login page: . .

WARNING: This will replace any existing files by the same name.2 Other webmail clients Many other webmail clients and services will work with our email service.8. in your browser. that domain isn’t in my list of allowed rcpthosts” or “sorry.domain. it does unfortunately affect the legitimate people who simply want to use another email server to send their email.7. 9. If you have any problems configuring your email client or if you should have any other questions regarding this feel free to contact us. that domain is not allowed to be relayed through this MTA” when trying to send email is commonly related to an anti-spam protection we have in place on our network. 9.7. .com. We highly recommend that you contact your ISP and request their outgoing mail server information.You can login your webmail directly at the URL mail. Webmail clients such as horde and squirrel mail need to be installed in your web space to work. 57 . − This can be accomplished from the WebShell utility on your control panel.1. including home computers.8. .2 POP before SMTP The reason you get the error message: “sorry. Sadly at this time there is no “trust” system in place that would allow certain email providers to be granted access. While this is a very good way to help eliminate random spam sources. This will not affect the appearance of your email. One of their methods is to block port 25. The best option for this situation is to contact your ISP who may be able to remove the block or give access to their email server for outgoing messages.You will then. This protection is called “POP-before-SMTP” and is for the benefit of your domain.9. This will usually start the install process. being used by spammers to send unwanted messages. It merely facilitates the starting point for the piece of mail. go to the location that you uncompressed the file.You then need to extract or uncompress the downloaded file.8 Troubleshooting 9. .3 Login directly to webmail Login directly to webmail: . These can be installed the same as any other php application.1 Port 25 Block With spam on the rise and many compromised computers. 9. ISP‘s have instituted new tactics to prevent the sending of unwanted messages on their networks. which is the port most mail servers and mail clients use by default for outgoing mail. as an outgoing mail server is not unlike a postal mail drop box. − Select the file you uploaded and then select the uncompress option to the right. it will not be possible for a spammer to use your mail server to relay their unwanted messages. and use this for your outgoing email. This block is intended to allow the ISP to regulate what email travels across their networks.The downloaded file needs to be uploaded to your hosting account. replace “domain” with your domain name. Due to this protection.

1 What is it? We honor spam complaints sent from individuals and a few different providers.3.9 SPAM 9.1 What is Spam? Email spam usually pertains to unsolicited commercial messages sent in bulk by people you don't know although there are exceptions to this rule. 9. this usually happens when you check for new messages.9.3. SpamCop – This service provides list of IP addresses of known spam sources. For a certain period of time after you check for mail.simply login again to your mail server (check your mailbox for new emails) and you will then be able to send again. Spam is mostly used to advertise products and sometimes to broadcast some political or social commentary. which can be opened in WordPad or other text editor. 9. 58 . If we received a complaint of spam from one of these sources we investigate the situation and if the complaint is valid we block the source IP address. As soon as you receive the same error message . 9. If we received a complaint of spam from one of these sources we investigate the situation and if the complaint is valid we block the source IP address.You can still use the SMTP service that comes with your account. Juno and UUNet.8.3 Postmaster block 9. Juno and UUNet. When sending mail you first have to login to your email server.8. "gray mail" and just plain "junk mail." the term is both a noun (the e-mail message) and a verb (to send it). The message instructs the blocked party to visit a link to the actual message sent.9. but we are taking steps to lessen the amount of spam received. you will receive a bounce-back message. Whenever you are blocked by this system. If these addresses receive a message it is almost guaranteed to be spam as these addresses are not used or public.8. Clicking the link will allow you to download the original complaint message. They maintain email addresses that are used as spam traps. Postmaster block . "unsolicited bulk e-mail" (UBE). You must place a ticket in our 24/7 Help Desk and our system administration team will review your request to have your IP removed from the blacklist. you are authorized to send email through your mail server. E-mail that is not requested is SPAM no special criteria needed.We honor spam complaints sent from individuals and a few different providers. Also known as "unsolicited commercial e-mail" (UCE). Some customers have decided (but are not required) to stop sending mail to AOL and other major mail services altogether to prevent further issues. Due to the fact that computers are not human detection will never be perfect. 9. Currently the following providers are honored AOL.1 How to get unblocked A customer must agree to stop causing spam complaints before the block may be removed. Currently the following providers are honored AOL.2 How we fight it Spam has become a part of life for anyone who has an email account.

) .A new option box will open.1 SpamAssassin filters in Outlook Express .From the outlook menu list click on “tools” and select “rules wizard” or “rules and alerts” .9.2 Thunderbird Spam Assassin Filters .Right click with your mouse on the inbox folder and from the popup menu select “mew folder” . 59 .Click “finish” (NOTE: Make sure that there is a check in the box to the left of the rule you just created and click ok. 9. We are in the process of developing a more advanced method for spam detection and blocking and we hope to have these systems available as soon as possible.SpamAssassin – This system works by "scoring" each e-mail message against a range of tests designed to identify if that message is spam or not.Click on or select “inbox” in your mail folders (NOTE: you may have to turn on folder view if it is not already on to select the Inbox folder.Click “next” . 9.From the folder list.3.On the window that pops up. A wide number of tests are provided. if the message dates are valid.In the box below.In the space below. including checks to see if the sender and recipient address are valid.Highlight “check messages when they arrive” . 9.Give the filter a name (such as “spam”) and click on the down arrow of the drop box that currently says “subject”. . .Look for “move to a folder named” and place a check in the box to its left . enter “X-Spam-Status: Yes” (without quotes) and click the “add” button (be sure you leave a blank space between the colon and the word Yes) . Find “customize…” at the bottom of the list and click on it.Click on “new” .This should move much of the spam you receive to the spam mail folder where you can review and delete it. Each test adds to a message's overall spam score.For the name of the folder enter “spam mail” and click ok .Click “next” and “next” again and for the name of the rule enter “spam marking” . . click on the underlined words “specific words” . messages over a certain user-defined threshold are marked as spam. and so on.9.Go to the tools menu and click on “message filters…” . click “new” to create a new message filter for spam. if any of the sending servers are blacklisted.3.Click “next” .3 How to reduce There are multiple options available to help control spam email. This will discuss the setting up of spam assassin filters and built in spam filters of Outlook Express and Thunderbird. You can download and install many different spam filters for your home email client.9. the folder you set up in steps 3 and 4.) . scroll to and select the folder spam mail. if the body contains any of a list of forbidden words.Start Outlook Express . .Select “start from a blank rule” .Start Thunderbird.Scroll down and look for the line “with specific words in the message header” and place a check in the box to the left of it. click on the underlined word “specified” .

Click OK. click on this option . Click “ok” Your new filter should show up in the list now.Start Thunderbird. In the 3rd box. under “new message header:” type X-Spam-Flag.- - In the pop-up window. and it will move it to the box below.Click the check box which says trust junk mail headers set by: then in the drop down box which is next to it select to use spam assassin. 9. type yes. If it doesn’t automatically change the first drop-down box to “X-Spam-Flag” that you just added.Click on tool you should see an option for junk mail controls. Click on the “add” button next to it.3 Junk mail controls in Thunderbird Thunderbird has a very good built in spam filter that is trainable and will catch most spam messages.9. 60 . Click the check box next to “move to folder” and select the folder that you want to move spam to. click on the arrow again and choose it from the list. .3. .Go to tools in the top navigation bar. you can close the window and you’re done! This should move much of the spam you receive to the spam mail folder where you can review and delete it. .

10. Databases SQL or "Structured Query Language" and is a commonly used way to access databases.Then select the database name. 10.1.1 MySQL 10.3 Changing MySQL disk quota To change MySQL disk quota: . Host Name: The domain name and IP address of the database server Port number: MySQL 3306 NOTE: If you have problems accessing phpMyAdmin from here.10.From the control panel. . It allows you to add. you will need to create a user name and password. Enter this same password again in the 'confirm password' field and assign a role for this user. You have now successfully created a MySQL database and user.1 Hosting MySQL databases MySQL is a database management system. . access. 10. 61 . it will return you to the same page. To access the MySQL database settings page: .1.Enter the name for your new database along with a description of the database.Click the 'add user' button. click the 'MySQL Server' icon. When this completes. try the main phpMyAdmin icon on the control panel.Click the 'MySQL Server' icon.Now. and process stored data.Click the 'MySQL Server' icon. You may now add additional users or grant privileges to users of other databases. Click the 'finish' button at the bottom when you are done.1. . .2 Creating MySQL databases To create MySQL databases: . click 'next'. When you are finished.Click the 'add' icon next to the words 'add database' .

” 62 . Click on the "pen & paper" icon to the right of this. .4 Adding/Removing MySQL users To add a MySQL user: . .Click the 'MySQL Server' Icon.Click “Built in phpMyAdmin control panel. 10. In the 'quota' field.Click the database name.6 Changing user permissions To change user permissions: . This can also be used to create and restore Mysql backups. 10. 10. 10. . . .Click the 'MySQL Server' Icon. select the user that you would like to change the password for .5 Changing user passwords To change user passwords: .Click the 'MySQL Server' icon. To remove a MySQL user: .Click the database name. .Click the 'MySQL Server' icon.1.Click the 'MySQL Server' Icon.Click 'change'. .In the 'database users' field. .2. .This will bring up the database settings page.Click the “trash can” icon next to the username and confirm to remove it. .Click 'submit'.Enter the new password and confirm.1.At the bottom.This will bring up the database settings page.In the 'database users' field. Choose a user role and click 'add'.- - Choose the database name that you would like to change the quota for and click the 'edit' icon that appears to the right of the database name. Click 'submit' when you are finished. click the 'add' icon.2 phpMyAdmin Phpmyadmin is a common tool used to view and edit the content within your databases. .Create a new user name along with a password and confirm this password. 10. . select the user that you would like to change the privileges for and click the 'edit' icon that appears to the right of the user name. .Click the empty box to add a check to each privilege you would like to grant to the user. . .Click the "pen & paper" icon that appears to the right of the user name. At this screen you may set the new database quota.Click the specific database name that you would like to edit. you will see the current amount of space the database uses and current disk quota set for this database.1.1 Editing MySQL databases To edit a MySQL database: .

you can make changes to the database such as creating/removing tables and editing data. . check 'Save as File' and create a name for the backup.Click the specific database name that you would like to restore from a backup.2.Click go 10. From here.Click the 'PgSQL Server’ icon on the control panel. click the database name in the drop down box. 63 .3. 10.On the left hand side.1 Hosting PostgreSQL databases In addition to MySQL. . . you may also create PostgreSQL databases. . .Click go . 10.Click the 'Import' tab located near the top of the screen.Click the database name on the left-hand side.Choose your preferred format type and any options you would like to apply. . Host Name: The domain name and IP address of the database server Port number: MySQL 3306 10.2 Creating backups To create a backup: .Depending on your browser's settings.At the bottom.3. . .Click the specific database name that you would like to create a backup of.Click the 'MySQL Server' icon. try the main phpMyAdmin icon on the control panel.Click the phpMyAdmin icon on the control panel. Click on the database name to the left.Click the 'Browse' button to select the backup file from your local computer.NOTE: If you have problems accessing phpMyAdmin from here. . . . .3 Restoring backups To restore a database: .2.2 Creating PostgreSQL database To create a PostgreSQL database: .Click the phpMyAdmin icon on the control panel. You may also choose a compression format.Click the 'export' tab located near the top of the screen. the backup file may automatically download or your browser may prompt you to save the file.3 PostgreSQL 10.

Click the "Pen & Paper" icon located to the right.4 Adding/Removing PostgreSQL users 10. you will see the current disk space used and the total disk space the database can occupy. 10. . click the "Pen & Paper" icon located to the right of the user name.Enter a desired user name and password and confirmed the password. Click on the database name to the left From here.Click on the specific database name that you would like to edit.5 Changing passwords To change PostgreSQL passwords: . 10. . . .Click Change 10. .Enter the desired quota. you can make changes to the database such as creating/removing tables and editing data.Click the 'Add User' icon at the bottom.Enter the new password and confirm it .Click 'Built in phpPgAdmin control panel'. .4. NOTE: If you have problems accessing phpPgAdmin from here.Click the 'PgSQL Server’ icon on the control panel. Choose an owner for the database from the dropdown. you will see all created users. 64 .3. . 10.Click the 'Add' button.Click on the database name that you would like to change the quota for. .3.At the bottom.1 Adding PostgreSQL users To add PostgreSQL users: .4.3.4 PgSQL 10.Near the bottom.3.- Click the 'Add Database' icon.Click the 'PgSQL Server’ icon on the control panel. .Click the 'Submit' button. . . .1 Editing PgSQL databases To edit a PgSQL database: .To delete a user.2 Removing users To remove PostgreSQL users: .Click the 'PgSQL Server’ icon on the control panel.Near the bottom.To change the password. try the main phpPgAdmin icon on the control panel.Click 'Yes. click the "trash can" icon that appears to the far right of the user name. When finished. 10. .3 Changing PgSQL disk quota To change the PostgreSQL disk quota: . Assign a name for the database. click the 'Submit' button. . .4.Click the 'PgSQL Server’ icon on the control panel. I agree with the above' to confirm. you will see all created users.3.Click the 'PgSQL Server’ icon on the control panel.

click the 'submit' button. . click the "pen & paper" icon . .Click the 'MSSQL Server' icon on the control panel. When you are finished. click the 'submit' button.5. . you will see all existing databases.2 Creating a new DSN record To create a new DSN Record.1 Hosting Microsoft SQL databases Microsoft SQL Server is a relational database management system produced by Microsoft.Enter the desired login name then enter the desired password twice. do the following: .In the 'database quota' field. do the following: . 65 .5.5 MSSQL (Windows plans only) 10.3 Adding MSSQL database users To add MSSQL database users. 10. When you are satisfied.At the bottom under the 'MS SQL databases' heading.Click the ODBC icon on your control panel page.Set the desired quota then click the 'submit' button 10.10.6.4 Changing MSSQL disk quota To change MSSQL disk quota.6.Open Database Connectivity is a standard database access method developed by Microsoft Corporation.Enter the desired database name.1 What is ODBC? ODBC .one for each database format. and the list of available ODBC drivers will show. Click the 'edit' button that appears to the right of the database name that you would like to edit. select the user from the dropdown that you would like to associate with this database. 10.6 ODBC 10.Click the 'MSSQL server' icon on the control panel.Click the 'add' button next to 'add new MS SQL login' .Click the 'MSSQL Server' icon on the control panel. click the 'add' button next to 'add database' . You can create a DSN (date source name) records based on ODBC drivers to access databases of different formats under Windows plan. Next.At the bottom.5. do the following: . It supports a superset of SQL. 10. ODBC makes it possible to access any data from any application by means of ODBC drivers .2 Creating MSSQL databases To create a MSSQL database: . .5. 10.

Fill the form that appears.6. .- Click the Add icon next to the DB driver you need. Forms are different depending on the DSN type: Enter the second part of your full DSN name in the DSN field. Directories and file names must include paths relative to your home dir root. - Click Create 10. NOTE: The first part of your full DSN name is your Windows login. . (the SourceDB field should include the name of the database and the extension).3 Editing DSN records To edit a DSN record. do the following: .Edit the DSN records in the form that appears.On the page that shows. click the edit icon next to the DSN record you need. in the “Your DSN” section. .Click update 66 .Click the ODBC icon on your control panel.

67 .4 Deleting DSN records To delete a DSN record.6.In the Your DSN section. do the following: . .Click the ODBC icon on your control panel. click the “trash can” icon next to the existing DSN to delete it.10.

Here are a few of the current providers worth looking into.Click the SSL icon on the control panel. 68 .com/. The c5 would represent the control panel which you are on.c5.1.org/docs/2. .ixwebhosting.8/index. To read more about what is SSL and how it works. This is done for both you and your customer’s safety. Most true business sites support this feature to increase security during data transmissions over the Internet.1 What is SSL? SSL (Secure Sockets Layer protocol) is a standard for transmitting confidential data such as credit card information over the Internet. You can find this information by clicking on the magnifying glass icon under SSL inside your hosting account control panel. If you are going to transmit sensitive information via a webpage it should be protected.1. 11. Dedicated SSL certificates are not free so they are usually something only used if you were going to process credit card transactions or transmit sensitive information. Thawte Go Daddy Verisign CAcert Rapid SSL 11.1 Providers There are many SSL providers that will provide you with a dedicated SSL certificate for your domain. go to http://www. These providers range in price and popularity depending on the provider. This is the standard minimum security level for an internet business. SSL works by using a private key and public key to encrypt data before it is transmitted. With shared SSL you usually get a secure URL like https://domain.2 Installing an SSL certificate To install an SSL certificate .11.Select the domain for which you wish to install the certificate.2 Shared vs. Shared SSL uses a certificate we provide to secure multiple sites.modssl. SSL 11. For dedicated SSL you must purchase your own SSL certificate and have a dedicated IP address to run the SSL server on. Dedicated SSL With a shared SSL certificate you get the benefits of SSL with out the costs that are usually associated with setting up a SSL server. at the other end the matching key decrypts the transmission.html 11.

Unlike a regular SSL certificate. it is free and doesn't require a dedicated IP. . You can’t have both shared and dedicated SSL certificates installed. Thus.The secure certificate would look like this domain. they will get an "unknown certification authority" warning window. while still belonging to an equally trusted Certificate Authority.2 Creating a temporary certificate The only difference between temporary and permanent certificates is that temporary certificates are generated by your control panel. 11.1 Using our shared SSL certificate You can use our shared SSL certificate instead of purchasing a certificate of your own. .2. do the following: . To use our shared SSL: .Click the generate link at the top of the form that appears.C*.Click the SSL on your control panel page.ixwebhosting. not trusted certificate authorities.If the icon is currently off then click the button under the shared SSL column to turn it on.- You can install a shared SSL certificate or a dedicated SSL certificate.com. 69 .2. To generate a new temporary SSL private key and certificate.Enable the SSL for the requested domain in the list. when visitors enter your site. . . 11.Click the SSL icon on the control panel.

70 .- Click on generate a temporary SSL certificate and certificate request.

Don't make changes to the data if you are not sure about the purpose of these changes. SSL server private key: This is the secret key to decrypt messages from your visitors. 71 . NOTE: You must remember to click the submit query link once you have relayed the information to the certificate authority. you will need it if you get a permanent certificate. Don't lose this key. It must be stored in a secure place where it is inaccessible to others. such as Thawte or VeriSign. This data will be used to generate the certificate. Use this request if you want to get a permanent SSL certificate from a trusted Certificate Authority. SSL certificate signing request: It includes the details that you submitted on the previous step.- Once you have the needed information filled in click on the submit button.

cacert.Temporary SSL certificate: It validates your identity and confirms the public key to assure the visitors that they are communicating with your server. 11. however for this tutorial we are going to use a free certificate provider. not any other party.3 Acquiring a permanent certificate There are many providers who can provide a SSL certificate.2.org. The previously created signing request completed above is submitted to CAcert: - CAcert provides the full server key to install: 72 .

-

Click the SSL icon from the control panel.

NOTE: After generating a CSR do not hit the on button because you will have to generate a new key from your provider. Once inside of the control panel you will click on the edit button

73

The certificate in this example has only one certificate, this is usually the case with a previously generated certificate request. Some providers will also give you multiple keys such as Go Daddy and Verisign

74

Once the certificate file has been pasted correctly select the upload button. This should be the last step. If you have installed your SSL certificate correctly you should see the information issued by your provider: NOTE: It can take a few hours for the changes to start working.

75

you will have to configure it from scratch. Many are php or asp based and most can easily be installed." You can manage osCommerce databases with any MySQL GUI client or the built-in phpMyAdmin control panel. So after you disable/enable it. until the store is fully configured and setup with a merchant account. 12. . 12. catalogs. This document is not a storefront management guide. such as products. We provide oscommerce to our customers which can be installed at the click of a single button. For instructions on how to operate your on-line shop visit the manufactures website. EDIT: Click the icon in the case that you somehow corrupted the templates and want to get them fixed.Create a database and a user. 76 .12. etc.1 Preinstalled osCommerce Your control panel comes with a one click install on-line store builder. osCommerce uses MySQL databases to store your commercial data. etc. This option resets the configuration file using the current hosting settings and restores the osCommerce files from the bundle. Creating an online store There are many different shopping carts systems available. It only explains how to install and access the integrated estores from your control panel.1 Setting up osCommerce To set up osCommerce online shop. .2 osCommerce controls ON/OFF: Enable/disable the resource.Click osCommerce on the control panel.On the page that shows enable osCommerce for the online store domain. do the following: . NOTE: Switching off or editing your osCommerce can permanently remove all your osCommerce settings.1. 12. NOTE: After initial setup the shopping cart is functional but not operational. This is done to restrict public access to osCommerce configuration. NOTE: You should set password protection on your "admin" directory using the Htprotect utility. called osCommerce. The databases used by osCommerce will show among your MySQL databases marked “Locked By osCommerce. databases. WARNING: Assigning a previously created MySQL database for use by osCommerce will clear contents of all its tables.1. It can also be useful if you have just set your e-shop to use a SSL certificate.

The downloaded file needs to be uploaded to your hosting account. ADMIN: Click the icon to go to your osCommerce administrative panel. .com/catalog in your browser and it will start the installation.2. − Select the file you uploaded and then select the uncompress option to the right. 77 . External shopping cart services can be much easier to setup and maintain. Most of the time there are installation instructions available in the downloaded file. (NOTE: This will remove any files or folders with the same name and location. X Cart and Cube Cart are supported on both our Windows and Linux packages. Providers such as King-Cart are all inclusive and work as a complimentary add-on to a hosting account. − You will access the domain.3 More information For more information refer to the manufactures website: http://oscommerce. − This can be accomplished from the WebShell3 utility on your control panel. it can be time consuming and complicated.com/ 12. The general flow is as follows: .) − This will extract the website and install files to a directory with the name of the compressed file.You then need to extract or uncompress the downloaded file. You can always contact us if you need specific compatibility information. 12.1 Setting up other shopping carts Our hosting packages will support most of the popular shopping cart applications. It is always best to check the system requirements for the shopping cart software which you want to install prior to attempting installation. 12.2 Shopping cart options 12.E-SHOP: Click the icon to go directly to your on-line store.1.2 How to setup Shopping cart applications such as Zen Cart are usually php or asp based and often downloaded as a compressed zip file. Setting up a shopping cart from scratch is not for everyone. − Navigate to the folder where you would like to install the application. Open source shopping carts such as Zen Cart.2.

please consult the help desk manual available at the following URL. 13. https://www. Getting technical support All of our support channels are available 24/7 to assist you. They can be reached from the front page of our website.ixwebhosting. Contact information can be found on the front page of our website.1 Ticket center Our support staff can be contacted through our Help Desk. 13. which can be reached from the 24/7 Help Desk icon on the account control panel or the ticket center icon at the bottom of the hosting account control panel. 78 .pdf 13.3 Phone support We have support staff available 24/7 by phone to assist with any account maintenance or technical support issue.2 Live chat Our live chat will be happy to assist you 24/7 with any issue. For more information on our Help Desk system.com/templates/ix/docs/Helpdesk_IX.13.

Sign up to vote on this title
UsefulNot useful